全文获取类型
收费全文 | 336篇 |
免费 | 9篇 |
专业分类
各国政治 | 36篇 |
工人农民 | 4篇 |
世界政治 | 51篇 |
外交国际关系 | 3篇 |
法律 | 163篇 |
中国政治 | 4篇 |
政治理论 | 83篇 |
综合类 | 1篇 |
出版年
2019年 | 2篇 |
2018年 | 3篇 |
2015年 | 5篇 |
2014年 | 5篇 |
2013年 | 27篇 |
2012年 | 9篇 |
2011年 | 16篇 |
2010年 | 15篇 |
2009年 | 16篇 |
2008年 | 18篇 |
2007年 | 11篇 |
2006年 | 14篇 |
2005年 | 19篇 |
2004年 | 10篇 |
2003年 | 8篇 |
2002年 | 5篇 |
2001年 | 2篇 |
2000年 | 3篇 |
1999年 | 6篇 |
1998年 | 2篇 |
1997年 | 4篇 |
1996年 | 6篇 |
1995年 | 3篇 |
1994年 | 4篇 |
1993年 | 8篇 |
1992年 | 2篇 |
1991年 | 7篇 |
1990年 | 8篇 |
1989年 | 8篇 |
1988年 | 2篇 |
1987年 | 4篇 |
1986年 | 7篇 |
1985年 | 9篇 |
1984年 | 4篇 |
1983年 | 5篇 |
1982年 | 4篇 |
1981年 | 11篇 |
1980年 | 5篇 |
1979年 | 5篇 |
1978年 | 6篇 |
1976年 | 8篇 |
1975年 | 2篇 |
1974年 | 3篇 |
1972年 | 2篇 |
1969年 | 3篇 |
1968年 | 3篇 |
1967年 | 2篇 |
1964年 | 2篇 |
1963年 | 2篇 |
1959年 | 2篇 |
排序方式: 共有345条查询结果,搜索用时 15 毫秒
131.
132.
Previous research on the determinants of police expenditures has not risen to the level of empirical understanding in large part because it has failed to explain substantively important variation among local jurisdictions. This suggests a need to reevaluate research strategies and to examine closely those cases which cannot be predicted using traditional, social, economic, and environmental approaches. Incorporating deviant case analysis, the authors outline an alternative approach to determine whether policy maker variables should be added to more broadly based models. 相似文献
133.
JAMES A. FAGIN 《国际比较与应用刑事审判杂志》2013,37(1-2):285-297
A review of current industrial practices, litigation trends, and the growing use of computer data banks and networks leads to the following conclusions about computer crime: data security and integrity are frequently compromised by lax security practices and operating procedures. Frequently the perceived but erroneous assumption that the inherent difficulty of the computer operating system will detour would-be violators is the only security a system has. This article describes methods commonly used to attack data bases and operating systems. The conclusion is that computer crime is an international phenomenon and investigation and prosecution are complex matters. For example, an examination of the copyright laws as they relate to computer crime indicates that there are frequent violations. International violators of the copyright laws frequently distribute bootleg copies of software worldwide. The article concludes that there is a gap between technology and law in the field of computer crimes. International cooperation is needed to define copyright laws and promote investigation and prosecution of international violators. 相似文献
134.
135.
136.
The introduction of the internal market to the National Health Service in Britain marks a major change in the form of provision of health care interventions. This article reports the findings of independent research into the development of the purchasing process in eight purchasing authorities (which collectively purchase health care for 5 per cent of the population of Britain), and considers the extent to which this has led to an explicit politics of rationing in British health care. The structure and organization of purchasing organizations is described, along with their relationship with providers of health care. The ability of purchasing organizations to assess the health needs of the populations for which they purchase health care services, and their ability to influence change in the nature of the services provided, is also examined. 相似文献
137.
138.
139.
140.
JAMES F. GILSINAN 《犯罪学》1989,27(2):329-344
This article examines the interaction of 911 operators with callers. The study is based on 36 hours of participant observation and an in-depth analysis of 265 randomly recorded telephone contacts between citizens and police emergency operators over a 24-hour period. Call processing is only partially explained by the in formation-gathering function of operators. Initial data from callers are used by operators to help the caller and the operator together construct a definition of an event that makes sense organizationally. Thus, the article describes the interpretive work of 911 operators and the consequences of such work for demand processing within police agencies. 相似文献